Security Basics mailing list archives

RE: Height of paranoia


From: "Scott Race" <scott () jda-networks com>
Date: Thu, 28 Aug 2008 14:22:01 -0700

Sometimes info can leak through simple and ancient techniques.

As an IT guy, I know about all of my execs passwords.  Who knows who else does. So, having them change their passwords 
would be my first thought.

Second, you might check the Exchange permissions inside their AD account to see who else has access to their email 
account.  I have seen some weird stuff before - a client who was going thru a divorce had info leaking, come to find 
out somehow his ex-wife's name had full permission to his mailbox and she was loading his account up in her Outlook.

Also keep in mind that the Administrator account probably has access to their email as well, it's as simple as File > 
Open > Other Users Folder.  So check the permissions just to make sure nothing obvious is jumping out at you.

The other suggestions are all good too.  I just think it's good to start with the basic obvious stuff - you can lock 
down the network all you want but if someone owns the password, they pretty much own the user.

Scott

-----Original Message-----
From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Adam Pal
Sent: Thursday, August 28, 2008 1:48 AM
To: security-basics () securityfocus com
Cc: hkhasgiwale () gmail com
Subject: Re: Height of paranoia

Hi Wali

As a fist measurement, i would separate the executive managers network, move the stations to another/new network 
segment. There you can also enable a different set of ACL rules.

As a 2nd measurement i would use point-to-point encryption, high confidential emails should be encryptet however so 
that would be a good time to apply it. 
There are a lot of tools, but you can pick one which is costs-effective and easy to implement in outlook. 


regards

Adam Pal


-------- Original-Nachricht --------
Datum: Wed, 27 Aug 2008 19:55:14 +0400
Von: "WALI" <hkhasgiwale () gmail com>
An: security-basics () securityfocus com
Betreff: Height of paranoia

It's a given that all workstations have XP firewall enabled, an enterprise
grade antivirus and Windows defender installed. I am the security guy.

The need is that there are a couple top management executives that have 
highly confidential data/emails residing on their desktops, and quite a
few 
times, the information seems to have leaked out.

Discounting the 'word of mouth' of their secretaries or the end recipients
of that information, I want to take as many precautions from the IT
security 
perspective as possible and even bring our domain admins and helpdesk 
personnel into the realm of doubt.

We have a Windows 20003/exchange 2003 environment of about a 2000 users. 
Here's what I have thought:

1. If I detach these executive PCs from the domain. Mails will stop
landing 
in MS Outlook. Is there a way around? Also DNS security doesn't register
any 
PC unless it's joined to a domain. I thought of this to make it out of 
bounds by system/domain admins. I have a feeling that their port 3389 gets
accessed when they aren't around.

2. Alternatively, create a private vlan on the core switch and make these 
PCs as it's members. Put an ACL and deny everything except ports required
to 
authenticate to AD and exchange and few other web applications. Monitor
port 
memberships regularly.

3. How to secure their emails from exchange admins (it's the height, I 
know).

Pls advise!! 

-- 
Psssst! Schon das coole Video vom GMX MultiMessenger gesehen?
Der Eine für Alle: http://www.gmx.net/de/go/messenger03


Current thread: